You are viewing documentation for version 2 of the AWS SDK for Ruby. Version 3 documentation can be found here.
Class: Aws::SSOAdmin::Client
- Inherits:
-
Seahorse::Client::Base
- Object
- Seahorse::Client::Base
- Aws::SSOAdmin::Client
- Defined in:
- (unknown)
Overview
An API client for AWS Single Sign-On Admin. To construct a client, you need to configure a :region
and :credentials
.
ssoadmin = Aws::SSOAdmin::Client.new(
region: region_name,
credentials: credentials,
# ...
)
See #initialize for a full list of supported configuration options.
Region
You can configure a default region in the following locations:
ENV['AWS_REGION']
Aws.config[:region]
Go here for a list of supported regions.
Credentials
Default credentials are loaded automatically from the following locations:
ENV['AWS_ACCESS_KEY_ID']
andENV['AWS_SECRET_ACCESS_KEY']
Aws.config[:credentials]
- The shared credentials ini file at
~/.aws/credentials
(more information) - From an instance profile when running on EC2
You can also construct a credentials object from one of the following classes:
Alternatively, you configure credentials with :access_key_id
and
:secret_access_key
:
# load credentials from disk
creds = YAML.load(File.read('/path/to/secrets'))
Aws::SSOAdmin::Client.new(
access_key_id: creds['access_key_id'],
secret_access_key: creds['secret_access_key']
)
Always load your credentials from outside your application. Avoid configuring credentials statically and never commit them to source control.
Instance Attribute Summary
Attributes inherited from Seahorse::Client::Base
Constructor collapse
-
#initialize(options = {}) ⇒ Aws::SSOAdmin::Client
constructor
Constructs an API client.
API Operations collapse
-
#attach_managed_policy_to_permission_set(options = {}) ⇒ Struct
Attaches an IAM managed policy ARN to a permission set.
If the permission set is already referenced by one or more account assignments, you will need to call
ProvisionPermissionSet
after this action to apply the corresponding IAM policy updates to all assigned accounts. -
#create_account_assignment(options = {}) ⇒ Types::CreateAccountAssignmentResponse
Assigns access to a principal for a specified AWS account using a specified permission set.
The term principal here refers to a user or group that is defined in AWS SSO.
As part of a successful
CreateAccountAssignment
call, the specified permission set will automatically be provisioned to the account in the form of an IAM policy attached to the SSO-created IAM role. -
#create_permission_set(options = {}) ⇒ Types::CreatePermissionSetResponse
Creates a permission set within a specified SSO instance.
To grant users and groups access to AWS account resources, use
CreateAccountAssignment
. -
#delete_account_assignment(options = {}) ⇒ Types::DeleteAccountAssignmentResponse
Deletes a principal's access from a specified AWS account using a specified permission set.
.
-
#delete_inline_policy_from_permission_set(options = {}) ⇒ Struct
Deletes the inline policy from a specified permission set.
.
-
#delete_permission_set(options = {}) ⇒ Struct
Deletes the specified permission set.
.
-
#describe_account_assignment_creation_status(options = {}) ⇒ Types::DescribeAccountAssignmentCreationStatusResponse
Describes the status of the assignment creation request.
.
-
#describe_account_assignment_deletion_status(options = {}) ⇒ Types::DescribeAccountAssignmentDeletionStatusResponse
Describes the status of the assignment deletion request.
.
-
#describe_permission_set(options = {}) ⇒ Types::DescribePermissionSetResponse
Gets the details of the permission set.
.
-
#describe_permission_set_provisioning_status(options = {}) ⇒ Types::DescribePermissionSetProvisioningStatusResponse
Describes the status for the given permission set provisioning request.
.
-
#detach_managed_policy_from_permission_set(options = {}) ⇒ Struct
Detaches the attached IAM managed policy ARN from the specified permission set.
.
-
#get_inline_policy_for_permission_set(options = {}) ⇒ Types::GetInlinePolicyForPermissionSetResponse
Obtains the inline policy assigned to the permission set.
.
-
#list_account_assignment_creation_status(options = {}) ⇒ Types::ListAccountAssignmentCreationStatusResponse
Lists the status of the AWS account assignment creation requests for a specified SSO instance.
.
-
#list_account_assignment_deletion_status(options = {}) ⇒ Types::ListAccountAssignmentDeletionStatusResponse
Lists the status of the AWS account assignment deletion requests for a specified SSO instance.
.
-
#list_account_assignments(options = {}) ⇒ Types::ListAccountAssignmentsResponse
Lists the assignee of the specified AWS account with the specified permission set.
.
-
#list_accounts_for_provisioned_permission_set(options = {}) ⇒ Types::ListAccountsForProvisionedPermissionSetResponse
Lists all the AWS accounts where the specified permission set is provisioned.
.
-
#list_instances(options = {}) ⇒ Types::ListInstancesResponse
Lists the SSO instances that the caller has access to.
.
-
#list_managed_policies_in_permission_set(options = {}) ⇒ Types::ListManagedPoliciesInPermissionSetResponse
Lists the IAM managed policy that is attached to a specified permission set.
.
-
#list_permission_set_provisioning_status(options = {}) ⇒ Types::ListPermissionSetProvisioningStatusResponse
Lists the status of the permission set provisioning requests for a specified SSO instance.
.
-
#list_permission_sets(options = {}) ⇒ Types::ListPermissionSetsResponse
Lists the PermissionSets in an SSO instance.
.
-
#list_permission_sets_provisioned_to_account(options = {}) ⇒ Types::ListPermissionSetsProvisionedToAccountResponse
Lists all the permission sets that are provisioned to a specified AWS account.
.
-
#list_tags_for_resource(options = {}) ⇒ Types::ListTagsForResourceResponse
Lists the tags that are attached to a specified resource.
.
-
#provision_permission_set(options = {}) ⇒ Types::ProvisionPermissionSetResponse
The process by which a specified permission set is provisioned to the specified target.
.
-
#put_inline_policy_to_permission_set(options = {}) ⇒ Struct
Attaches an IAM inline policy to a permission set.
If the permission set is already referenced by one or more account assignments, you will need to call
ProvisionPermissionSet
after this action to apply the corresponding IAM policy updates to all assigned accounts. -
#tag_resource(options = {}) ⇒ Struct
Associates a set of tags with a specified resource.
.
-
#untag_resource(options = {}) ⇒ Struct
Disassociates a set of tags from a specified resource.
.
-
#update_permission_set(options = {}) ⇒ Struct
Updates an existing permission set.
.
Instance Method Summary collapse
-
#wait_until(waiter_name, params = {}) {|waiter| ... } ⇒ Boolean
Waiters polls an API operation until a resource enters a desired state.
-
#waiter_names ⇒ Array<Symbol>
Returns the list of supported waiters.
Methods inherited from Seahorse::Client::Base
add_plugin, api, #build_request, clear_plugins, define, new, #operation, #operation_names, plugins, remove_plugin, set_api, set_plugins
Methods included from Seahorse::Client::HandlerBuilder
#handle, #handle_request, #handle_response
Constructor Details
#initialize(options = {}) ⇒ Aws::SSOAdmin::Client
Constructs an API client.
Instance Method Details
#attach_managed_policy_to_permission_set(options = {}) ⇒ Struct
Attaches an IAM managed policy ARN to a permission set.
If the permission set is already referenced by one or more account assignments, you will need to call ProvisionPermissionSet
after this action to apply the corresponding IAM policy updates to all assigned accounts.
#create_account_assignment(options = {}) ⇒ Types::CreateAccountAssignmentResponse
Assigns access to a principal for a specified AWS account using a specified permission set.
The term principal here refers to a user or group that is defined in AWS SSO. As part of a successful CreateAccountAssignment
call, the specified permission set will automatically be provisioned to the account in the form of an IAM policy attached to the SSO-created IAM role. If the permission set is subsequently updated, the corresponding IAM policies attached to roles in your accounts will not be updated automatically. In this case, you will need to call ProvisionPermissionSet
to make these updates.
#create_permission_set(options = {}) ⇒ Types::CreatePermissionSetResponse
Creates a permission set within a specified SSO instance.
To grant users and groups access to AWS account resources, use CreateAccountAssignment
.
#delete_account_assignment(options = {}) ⇒ Types::DeleteAccountAssignmentResponse
Deletes a principal's access from a specified AWS account using a specified permission set.
#delete_inline_policy_from_permission_set(options = {}) ⇒ Struct
Deletes the inline policy from a specified permission set.
#delete_permission_set(options = {}) ⇒ Struct
Deletes the specified permission set.
#describe_account_assignment_creation_status(options = {}) ⇒ Types::DescribeAccountAssignmentCreationStatusResponse
Describes the status of the assignment creation request.
#describe_account_assignment_deletion_status(options = {}) ⇒ Types::DescribeAccountAssignmentDeletionStatusResponse
Describes the status of the assignment deletion request.
#describe_permission_set(options = {}) ⇒ Types::DescribePermissionSetResponse
Gets the details of the permission set.
#describe_permission_set_provisioning_status(options = {}) ⇒ Types::DescribePermissionSetProvisioningStatusResponse
Describes the status for the given permission set provisioning request.
#detach_managed_policy_from_permission_set(options = {}) ⇒ Struct
Detaches the attached IAM managed policy ARN from the specified permission set.
#get_inline_policy_for_permission_set(options = {}) ⇒ Types::GetInlinePolicyForPermissionSetResponse
Obtains the inline policy assigned to the permission set.
#list_account_assignment_creation_status(options = {}) ⇒ Types::ListAccountAssignmentCreationStatusResponse
Lists the status of the AWS account assignment creation requests for a specified SSO instance.
#list_account_assignment_deletion_status(options = {}) ⇒ Types::ListAccountAssignmentDeletionStatusResponse
Lists the status of the AWS account assignment deletion requests for a specified SSO instance.
#list_account_assignments(options = {}) ⇒ Types::ListAccountAssignmentsResponse
Lists the assignee of the specified AWS account with the specified permission set.
#list_accounts_for_provisioned_permission_set(options = {}) ⇒ Types::ListAccountsForProvisionedPermissionSetResponse
Lists all the AWS accounts where the specified permission set is provisioned.
#list_instances(options = {}) ⇒ Types::ListInstancesResponse
Lists the SSO instances that the caller has access to.
#list_managed_policies_in_permission_set(options = {}) ⇒ Types::ListManagedPoliciesInPermissionSetResponse
Lists the IAM managed policy that is attached to a specified permission set.
#list_permission_set_provisioning_status(options = {}) ⇒ Types::ListPermissionSetProvisioningStatusResponse
Lists the status of the permission set provisioning requests for a specified SSO instance.
#list_permission_sets(options = {}) ⇒ Types::ListPermissionSetsResponse
Lists the PermissionSets in an SSO instance.
#list_permission_sets_provisioned_to_account(options = {}) ⇒ Types::ListPermissionSetsProvisionedToAccountResponse
Lists all the permission sets that are provisioned to a specified AWS account.
#list_tags_for_resource(options = {}) ⇒ Types::ListTagsForResourceResponse
Lists the tags that are attached to a specified resource.
#provision_permission_set(options = {}) ⇒ Types::ProvisionPermissionSetResponse
The process by which a specified permission set is provisioned to the specified target.
#put_inline_policy_to_permission_set(options = {}) ⇒ Struct
Attaches an IAM inline policy to a permission set.
If the permission set is already referenced by one or more account assignments, you will need to call ProvisionPermissionSet
after this action to apply the corresponding IAM policy updates to all assigned accounts.
#tag_resource(options = {}) ⇒ Struct
Associates a set of tags with a specified resource.
#untag_resource(options = {}) ⇒ Struct
Disassociates a set of tags from a specified resource.
#update_permission_set(options = {}) ⇒ Struct
Updates an existing permission set.
#wait_until(waiter_name, params = {}) {|waiter| ... } ⇒ Boolean
Waiters polls an API operation until a resource enters a desired state.
Basic Usage
Waiters will poll until they are succesful, they fail by entering a terminal state, or until a maximum number of attempts are made.
# polls in a loop, sleeping between attempts client.waiter_until(waiter_name, params)
Configuration
You can configure the maximum number of polling attempts, and the delay (in seconds) between each polling attempt. You configure waiters by passing a block to #wait_until:
# poll for ~25 seconds
client.wait_until(...) do |w|
w.max_attempts = 5
w.delay = 5
end
Callbacks
You can be notified before each polling attempt and before each
delay. If you throw :success
or :failure
from these callbacks,
it will terminate the waiter.
started_at = Time.now
client.wait_until(...) do |w|
# disable max attempts
w.max_attempts = nil
# poll for 1 hour, instead of a number of attempts
w.before_wait do |attempts, response|
throw :failure if Time.now - started_at > 3600
end
end
Handling Errors
When a waiter is successful, it returns true
. When a waiter
fails, it raises an error. All errors raised extend from
Waiters::Errors::WaiterFailed.
begin
client.wait_until(...)
rescue Aws::Waiters::Errors::WaiterFailed
# resource did not enter the desired state in time
end
#waiter_names ⇒ Array<Symbol>
Returns the list of supported waiters. The following table lists the supported waiters and the client method they call:
Waiter Name | Client Method | Default Delay: | Default Max Attempts: |
---|